首页 | 官方网站   微博 | 高级检索  
     

云计算环境下基于FANP的用户行为的可信评估与控制分析
引用本文:吕艳霞,田立勤,孙珊珊.云计算环境下基于FANP的用户行为的可信评估与控制分析[J].计算机科学,2013,40(1):132-135,138.
作者姓名:吕艳霞  田立勤  孙珊珊
作者单位:(东北大学信息科学与工程学院 沈阳110044);(青海师范大学计算机学院 西宁810008);(华北科技学院电子信息工程学院 北京101601)
基金项目:973计划专项(2011CB311809);国家自然科学基金项目(61163050);河北省自然科学基金项目(F2010001745);新世纪优秀人才支持计划(NCET-10-0101)资助
摘    要:云计算环境下,开放的运行环境使其面临重大的安全挑战,仅仅提供用户身份认证的安全控制已经不能完全适应云计算等新型计算机网络的应用。结合动态的行为可信的安全措施,有效地确定不可信云终端用户并正确分析云用户的异常行为是在复杂动态环境下保证云安全的基础。采用基于三角模糊数的模糊网络分析法(FANP),通过使用模糊数来反映专家评判的模糊性,弱化了单纯使用ANP方法存在的主观性,并对网络用户行为各属性的权重进行了量化计算,使评判结果更加客观。评价结果为基于动态信任的安全控制提供了量化分析的基础,为服务提供者采取更加安全的策略来响应用户请求提供了量化依据。

关 键 词:模糊网络分析法  用户行为  可信评估  云计算

Trust Evaluation and Control Analysis of FANP-based User Behavior in Cloud Computing Environment
LV Yan-xia,TIAN Li-qin,SUN Shan-shan.Trust Evaluation and Control Analysis of FANP-based User Behavior in Cloud Computing Environment[J].Computer Science,2013,40(1):132-135,138.
Authors:LV Yan-xia  TIAN Li-qin  SUN Shan-shan
Affiliation:3(College of Information Science and Engineering,Northeastern University,Shenyang 110044,China)1(School of Computer Science and Technology,Qinghai Normal University,Xining 810008,China)2(College of Electronic and Information Engineering,North China Institute of Science and Technology,Beijing 101601,China)3
Abstract:The open environment in cloud computing is much more complex and unpredictable, and can not fully adapt to the new application of computer network such as cloud computing. Combining such security measures of dynamic user behavior trust, effectively confirming the untrusted cloud terminal users and correctly analyzing their abnormal behavior are the basis to ensure cloud security in complex and dynamic environment This paper adopted the method of fuzzy analytic network process(FANP) based on triangular fuzzy numbers, which can reflect the fuzziness of expert evaluation through using fuzzy numbers, and weaken the subjectivity of simply using ANP. The paper also gave a quantization calculation to the weight of each attribute in order to make the evaluation results more objective. The evaluation results provide a quantitative analysis foundation for security control based on dynamic trust and provide the quantitative basis for service providers who adopt a more safe strategy in response to a user's requesting.
Keywords:Fuzzy analytic network process  User behavior  Trust evaluation  Cloud computing
本文献已被 CNKI 等数据库收录!
点击此处可从《计算机科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号